- Information about an EC2 instance (e.g., hostname, instance type, network settings, …)
- Can be accessed from within the EC2 instance itself by making a request to the EC2 metadata service
http://169.254.169.254/latest/meta-data
- Can be accessed using EC2 API or CLI tools (e.g., curl or wget)
- Metadata is stored in key-value pairs
- Useful for automating tasks such as setting up an instance's hostname, configuring networking, or installing software
- ami-id, block-device-mapping/, instance-id, instance-type, network/
- hostname, local-hostname, local-ipv4, public-hostname, public-ipv4
- Iam – InstanceProfileArn, InstanceId
- iam/security-credentials/role-name – temporary credentials for therole attached to your instance
- placement/ – launch Region, launch AZ, placement group name…
- security-groups – names of security groups
- tags/instance – tags attached to the instance
- This is how the EC2 instance gets credentials to perform the actions on AWS resources.
- You can use local firewall rules to disable access for some or all processes
- iptables for Linux, PF or IPFW for FreeBSD
$ sudo iptables --append OUTPUT --proto tcp --destination 169.254.169.254 --match owner --uid-owner apache -jump REJECT
- Turn off access using AWS Console or AWS CLI (HttpEndpoint=disabled)
-
IMDSv1 is accessing directly
-
IMDSv2 is more secure and is done in two steps:
- Get Session Token (limited validity) – using headers & PUT
$TOKEN= curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600"'
- Use Session Token in IMDSv2 calls – using headers
curl http://169.254.169.254/latest/meta-data/profile -H "X-aws-ec2-metadata-token: $TOKEN"
- Both IMDSv1 and IMDSv2 are available (enabled by default)
- The CloudWatch Metric MetadataNoToken provide information on how much IMDSv1 is used
- You can force Metadata Version 2 at Instance Launch using either:
- AWS console
- AWS CLI “HttpTokens: required”
- You can require IMDSv2 when registering an AMI: --imds-support v2.0
- AWS credentials provided by the IMDS now include an ec2:RoleDelivery IAM context key
- 1.0 for IMDSv1
- 2.0 for IMDS v2
- Attach this policy to the IAM Role of the EC2 Instance
- Or attach it to an S3 bucket to only require IMDSv2 when API calls are made by an IAM role
- Or attach it as an SCP in your account
- Prevent the launch of an EC2 instance using old instance metadata (IMDSv1)
- Prevent modifying a running EC2 instance using ModifyInstanceMetadataOptions API to re-enable old instance metadata (IMDSv1)